• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

New SSH Device

Risk Factors

Gaining access to a physical ethernet port can be difficult; however, if an attacker is successful, it is relatively easy to add a device such as a Raspberry Pi. After connecting the device to the network, an attacker can establish a remote SSH connection to obscure attempts to establish command-and-control beaconing or exfiltrate data.

Kill Chain

Caution

Risk Score

60

Detection diagram
Next in Caution: New Telnet Activity

Attack Background

N/A

Mitigation Options

Ensure ethernet ports are not accessible in unattended public areas

Block outbound connections on port 22

Quarantine the device while checking for indicators of compromise, such as the presence of malware

Quarantine the device, determine that it belongs on your network, and check for malicious activity

MITRE ATT&CK ID

What else can RevealX do for you?